General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    7dfbdd1e016c33c9a440c03ad613c098

  • SHA1

    1f62f66eab056aa5a5494ea4abbf756b7cc06c67

  • SHA256

    604c74ab831593a53bef2aed10ee5c62e90cb3f536ae513425128c4f37d47530

  • SHA512

    dd50674e3cb1b50623bf6c7fd467143ce50459996663dc6a568ce41d04f05ec35ed03d136874cf45fcef871776575fe2082a281b374f1bda223c9ca6ae810441

  • SSDEEP

    1536:bU/r7EkrjaFIs7E5OxzJn8LjEwzGi1dDLDFgS:bU7jau5OVVni1drS

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

designed-circuit.gl.at.ply.gg:5555

Mutex

21708ce4f6dfec28a77d4a18ce385b58

Attributes
  • reg_key

    21708ce4f6dfec28a77d4a18ce385b58

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections